CVE-2025-65034

Rallly is an open-source scheduling and collaboration tool. Prior to version 4.5.4, an improper authorization vulnerability allows any authenticated user to reopen finalized polls belonging to other users by manipulating the pollId parameter. This can disrupt events managed by other users and compromise both availability and integrity of poll data. This issue has been patched in version 4.5.4.
Configurations

Configuration 1 (hide)

cpe:2.3:a:rallly:rallly:*:*:*:*:*:*:*:*

History

24 Nov 2025, 18:02

Type Values Removed Values Added
First Time Rallly rallly
Rallly
References () https://github.com/lukevella/rallly/releases/tag/v4.5.4 - () https://github.com/lukevella/rallly/releases/tag/v4.5.4 - Release Notes
References () https://github.com/lukevella/rallly/security/advisories/GHSA-5fp2-pv2j-rqpc - () https://github.com/lukevella/rallly/security/advisories/GHSA-5fp2-pv2j-rqpc - Exploit, Vendor Advisory
CPE cpe:2.3:a:rallly:rallly:*:*:*:*:*:*:*:*

19 Nov 2025, 21:15

Type Values Removed Values Added
References () https://github.com/lukevella/rallly/security/advisories/GHSA-5fp2-pv2j-rqpc - () https://github.com/lukevella/rallly/security/advisories/GHSA-5fp2-pv2j-rqpc -

19 Nov 2025, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-11-19 18:15

Updated : 2025-11-24 18:02


NVD link : CVE-2025-65034

Mitre link : CVE-2025-65034

CVE.ORG link : CVE-2025-65034


JSON object : View

Products Affected

rallly

  • rallly
CWE
CWE-639

Authorization Bypass Through User-Controlled Key